34fa0ce8f7
Check and skip VPP_EXCLUDED_PLUGINS tests for most of plugins. Type: improvement Signed-off-by: Dmitry Valter <d-valter@yandex-team.com> Change-Id: I23fd3666729251c639aa8da72a676058e3f5bb4e
191 lines
5.9 KiB
Python
191 lines
5.9 KiB
Python
#!/usr/bin/env python3
|
|
|
|
import unittest
|
|
|
|
from framework import VppTestCase
|
|
from asfframework import VppTestRunner
|
|
from scapy.layers.inet import IP, TCP, UDP
|
|
from scapy.layers.inet6 import (
|
|
IPv6,
|
|
ICMPv6EchoRequest,
|
|
ICMPv6EchoReply,
|
|
)
|
|
from scapy.layers.l2 import Ether, GRE
|
|
from util import ppp
|
|
from vpp_papi import VppEnum
|
|
from config import config
|
|
|
|
|
|
@unittest.skipIf("nat" in config.excluded_plugins, "Exclude NAT plugin tests")
|
|
class TestNAT66(VppTestCase):
|
|
"""NAT66 Test Cases"""
|
|
|
|
@classmethod
|
|
def setUpClass(cls):
|
|
super(TestNAT66, cls).setUpClass()
|
|
|
|
cls.nat_addr = "fd01:ff::2"
|
|
cls.create_pg_interfaces(range(2))
|
|
cls.interfaces = list(cls.pg_interfaces)
|
|
|
|
for i in cls.interfaces:
|
|
i.admin_up()
|
|
i.config_ip6()
|
|
i.configure_ipv6_neighbors()
|
|
|
|
@property
|
|
def config_flags(self):
|
|
return VppEnum.vl_api_nat_config_flags_t
|
|
|
|
def plugin_enable(self):
|
|
self.vapi.nat66_plugin_enable_disable(enable=1)
|
|
|
|
def plugin_disable(self):
|
|
self.vapi.nat66_plugin_enable_disable(enable=0)
|
|
|
|
def setUp(self):
|
|
super(TestNAT66, self).setUp()
|
|
self.plugin_enable()
|
|
|
|
def tearDown(self):
|
|
super(TestNAT66, self).tearDown()
|
|
if not self.vpp_dead:
|
|
self.plugin_disable()
|
|
|
|
def test_static(self):
|
|
"""1:1 NAT66 test"""
|
|
flags = self.config_flags.NAT_IS_INSIDE
|
|
self.vapi.nat66_add_del_interface(
|
|
is_add=1, flags=flags, sw_if_index=self.pg0.sw_if_index
|
|
)
|
|
self.vapi.nat66_add_del_interface(is_add=1, sw_if_index=self.pg1.sw_if_index)
|
|
self.vapi.nat66_add_del_static_mapping(
|
|
local_ip_address=self.pg0.remote_ip6,
|
|
external_ip_address=self.nat_addr,
|
|
is_add=1,
|
|
)
|
|
|
|
# in2out
|
|
pkts = []
|
|
p = (
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
|
|
/ TCP()
|
|
)
|
|
pkts.append(p)
|
|
p = (
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
|
|
/ UDP()
|
|
)
|
|
pkts.append(p)
|
|
p = (
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
|
|
/ ICMPv6EchoRequest()
|
|
)
|
|
pkts.append(p)
|
|
p = (
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
|
|
/ GRE()
|
|
/ IP()
|
|
/ TCP()
|
|
)
|
|
pkts.append(p)
|
|
self.pg0.add_stream(pkts)
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
capture = self.pg1.get_capture(len(pkts))
|
|
|
|
for packet in capture:
|
|
try:
|
|
self.assertEqual(packet[IPv6].src, self.nat_addr)
|
|
self.assertEqual(packet[IPv6].dst, self.pg1.remote_ip6)
|
|
self.assert_packet_checksums_valid(packet)
|
|
except:
|
|
self.logger.error(ppp("Unexpected or invalid packet:", packet))
|
|
raise
|
|
|
|
# out2in
|
|
pkts = []
|
|
p = (
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
/ IPv6(src=self.pg1.remote_ip6, dst=self.nat_addr)
|
|
/ TCP()
|
|
)
|
|
pkts.append(p)
|
|
p = (
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
/ IPv6(src=self.pg1.remote_ip6, dst=self.nat_addr)
|
|
/ UDP()
|
|
)
|
|
pkts.append(p)
|
|
p = (
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
/ IPv6(src=self.pg1.remote_ip6, dst=self.nat_addr)
|
|
/ ICMPv6EchoReply()
|
|
)
|
|
pkts.append(p)
|
|
p = (
|
|
Ether(dst=self.pg1.local_mac, src=self.pg1.remote_mac)
|
|
/ IPv6(src=self.pg1.remote_ip6, dst=self.nat_addr)
|
|
/ GRE()
|
|
/ IP()
|
|
/ TCP()
|
|
)
|
|
pkts.append(p)
|
|
self.pg1.add_stream(pkts)
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
capture = self.pg0.get_capture(len(pkts))
|
|
for packet in capture:
|
|
try:
|
|
self.assertEqual(packet[IPv6].src, self.pg1.remote_ip6)
|
|
self.assertEqual(packet[IPv6].dst, self.pg0.remote_ip6)
|
|
self.assert_packet_checksums_valid(packet)
|
|
except:
|
|
self.logger.error(ppp("Unexpected or invalid packet:", packet))
|
|
raise
|
|
|
|
sm = self.vapi.nat66_static_mapping_dump()
|
|
self.assertEqual(len(sm), 1)
|
|
self.assertEqual(sm[0].total_pkts, 8)
|
|
|
|
def test_check_no_translate(self):
|
|
"""NAT66 translate only when egress interface is outside interface"""
|
|
flags = self.config_flags.NAT_IS_INSIDE
|
|
self.vapi.nat66_add_del_interface(
|
|
is_add=1, flags=flags, sw_if_index=self.pg0.sw_if_index
|
|
)
|
|
self.vapi.nat66_add_del_interface(
|
|
is_add=1, flags=flags, sw_if_index=self.pg1.sw_if_index
|
|
)
|
|
self.vapi.nat66_add_del_static_mapping(
|
|
local_ip_address=self.pg0.remote_ip6,
|
|
external_ip_address=self.nat_addr,
|
|
is_add=1,
|
|
)
|
|
|
|
# in2out
|
|
p = (
|
|
Ether(dst=self.pg0.local_mac, src=self.pg0.remote_mac)
|
|
/ IPv6(src=self.pg0.remote_ip6, dst=self.pg1.remote_ip6)
|
|
/ UDP()
|
|
)
|
|
self.pg0.add_stream([p])
|
|
self.pg_enable_capture(self.pg_interfaces)
|
|
self.pg_start()
|
|
capture = self.pg1.get_capture(1)
|
|
packet = capture[0]
|
|
try:
|
|
self.assertEqual(packet[IPv6].src, self.pg0.remote_ip6)
|
|
self.assertEqual(packet[IPv6].dst, self.pg1.remote_ip6)
|
|
except:
|
|
self.logger.error(ppp("Unexpected or invalid packet:", packet))
|
|
raise
|
|
|
|
|
|
if __name__ == "__main__":
|
|
unittest.main(testRunner=VppTestRunner)
|